Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > Security Operations > SecOps-Pro

SecOps-Pro Palo Alto Networks Security Operations Professional Question and Answers

Question # 4

Which Cortex XDR Exploit Prevention Module (EPM) is specifically designed to detect and block "Return-Oriented Programming" (ROP) techniques by monitoring for "stack pivoting" or "jump to return" instructions?

A.

Anti-Exploit Core

B.

JMP2RET / Stack Pivot Protection

C.

Local Privilege Escalation Protection

D.

DLL Security

Full Access
Question # 5

An analyst identifies that a custom internal application is being incorrectly flagged as malicious by the Behavioral Threat Protection (BTP) module. What is the best way to stop these alerts while maintaining security for other applications?

A.

Disable the BTP module in the endpoint's Malware Profile.

B.

Add the application's file hash to the Global Block List.

C.

Create a specific Exception for the alert from the Incident View.

D.

Move the endpoint to a policy group with no security profiles.

Full Access
Question # 6

Which two steps belong in the Cortex XSOAR incident lifecycle? (Choose two.)

A.

Planning

B.

Incident creation

C.

Incident notification

D.

Preparation

Full Access
Question # 7

A company has a highly segmented network where the Cortex XSOAR server cannot directly communicate with an on-premises mail server. Which component should be deployed in the mail server's segment to facilitate integration?

A.

Broker VM

B.

XSOAR Engine

C.

Cortex Gateway

D.

XSOAR Proxy

Full Access
Question # 8

How can an administrator run a Cortex XSOAR playbook regularly at a specific time and day of the week?

A.

By configuring the playbook to run on a specific date and time

B.

By creating a job that will run the playbook

C.

By creating a scheduled report that will run the playbook

D.

By creating a script that will run the playbook

Full Access
Question # 9

Why would a security engineer be unable to activate Cortex XDR analytics when configuring data sources and alert sensors during a Cortex XSIAM evaluation? (Choose one answer)

A.

The engineer needs to install the Analytics engine.

B.

Pathfinder must be activated before turning on analytics.

C.

Baseline requirements must be met before activating analytics.

D.

The engineer still needs to activate the identity Analytics engine.

Full Access
Question # 10

Which two statements are relevant to reports in Cortex XDR? (Choose two.)

A.

They can be sent in a password protected PDF version.

B.

They can be automatically pushed to the corporate intranet.

C.

They can use mock data for visualization.

D.

They can have an attached screenshot of an XQL query widget.

Full Access
Question # 11

Which metric is used by SOC management to measure the average "Dwell Time"—the duration between a successful compromise and the moment it is first identified by a security tool or analyst?

A.

MTTR (Mean Time to Respond)

B.

MTTA (Mean Time to Acknowledge)

C.

MTTD (Mean Time to Detect)

D.

MTTC (Mean Time to Contain)

Full Access
Question # 12

In the MITRE ATT & CK framework, which term describes the specific high-level "Why" or goal of an attacker, such as "Initial Access" or "Exfiltration"?

A.

Technique

B.

Tactic

C.

Procedure

D.

Mitigation

Full Access
Question # 13

Which activities are facilitated through the War Room in Cortex XSOAR? (Choose one answer)

A.

Running security playbooks, scripts, and commands

B.

Creating, editing, and deleting tasks in the workplan

C.

Viewing a summary of case details and alerts

D.

Conducting initial investigation of incident data and threat intelligence

Full Access
Question # 14

Which scripting language will allow the use of the Query Builder in Cortex XDR to show the top five accounts with failed Windows logons in the past 24 hours? (Choose one answer)

A.

PowerShell

B.

JavaScript

C.

XQL

D.

Python

Full Access
Question # 15

A customer is investigating a security incident in which unusual network traffic is observed and a malicious process is identified on an endpoint. Which Cortex XDR capability assists with correlating firewall network logs and endpoint data in this environment?

A.

Log stitching

B.

User authentication management

C.

Indicator of compromise (IOC) rule

D.

Analytics

Full Access
Question # 16

What is required to enable ingestion of on-premises firewall logs into Cortex XDR?

A.

Broker VM

B.

API

C.

PAN-OS content pack

D.

Cloud Identity Engine

Full Access
Question # 17

What is the function of a Causality View?

A.

To provide users access to collaborate and execute CLI commands in Cortex XDR and Cortex XSIAM

B.

To present the alerts and process execution chain of all activity pertaining to the same event

C.

To consolidate multiple security tools into a single interface to improve analyst productivity

D.

To present alerts from multiple data sources as individual incidents in the console

Full Access
Question # 18

Which Cortex XDR component raises an alert when suspicious activity composed of multiple events is detected and deviates from established baseline behavior?

A.

Analytics Engine

B.

Causality Analysis Engine

C.

XQL Query Engine

D.

Cloud Identity Engine

Full Access